You are on page 1of 90

毕业设计

Mobile application for personal health record system

学 院 Yunnan Technology and Business University


(School (College))
专 业 Computer Science and Technology
(Major)
班 级 Class 1 of 2018 CST
(Class)
学 号 18L55170016
(Student No.)
姓 名 KAFI MD ISRAFIL MOMIN
(Student Name)
指 导 教 师 李桃
(Supervisor)
职 称 Mobile Application for Child Monitoring and Control system
(Title)
成 绩
(Score)
日 期
(Date)
云南工商学院
Yunnan Technology and Business University
20 年 月
学术诚信声明

本人所呈交的毕业论文,是在导师的指导下,独立进行研究工作所取
得的成果所有数据、图片资料均真实可靠。除文中已经注明引用的内容外,
本论文不包含任何其他人或集体已经发表或撰写过的作品或成果。对本论
文的研究做出重要贡献的个人和集体,均已在文中以明确的方式标明。本
毕业论文的知识产权归属于培养单位。本人完全意识到本声明的法律结果
由本人承担。
本人签名: 日期:29 MAY/ 2022

Statement of Academic Integrity

I hereby acknowledge that the thesis submitted is a product of my own


independent research under the supervision of my supervisor, and that all the data,
statistics, pictures and materials are reliable and trustworthy, and that all the
previousresearch and sources are appropriately marked in the thesis, and that the
intellectual property of the thesis belongs to the school. I am fully aware of the
legal effect of thisstatement.

Student Signature: Date:29 MAY/ 2022


云南工商学院

毕业设计选题申报表
题目名称
Mobile Application for Child Monitoring and Control system

学生姓名 KAFI MD 联系电


学号 18L55170016 +8801302477978
ISRAFIL 话
MOMIN
班级名称 分院
Computer Science and Technology 云南工商学院
名称

题目来源 □教师科研 □社会实践 □理论研究 □应用研究


题目类型
 实验(实训)□其它  设计开发 □其它
The project was designed for children to monitor and control online side effects. This
选题目的
project was given depth information about the child tracking system with the help of four
components such as GPS, telephony services, adult content blocked automatically by Ad-
、价值及
Blocker, and cast screen control option the application is built-in. Finally, this application
意义
has room for enhancement. Crisis cautions such elements can be added to the upgrade of
the framework. The proposed framework will be worked on in later work. This is my
project of System Design about the “Android based children safety and control”
application based on Java. We advanced countless things and acquired a ton of information
about the improvement field. We hope this will prove fruitful for us.

评审意见:

该选题符合要求!
指导教师
评审意见

指导教师签名:

年 月 日
评审意见:

分 院
评 审
意见
毕业论文(设计)指导委员会(主任)
签名:
年 月 日
云南工商学院
毕业设计任务书
题目名
Mobile Application for Child Monitoring and control System

学生姓 KAFI MD ISRAFIL +88013024


学号 18L55170016 联系电话
名 MOMIN 77978

班级名
Computer Science and Technology 分院名称 云南工商学院

□理论研究
题目来 □教师科研 □社会实践
题目类型 □应用研究
源 实验(实训)□其它
设计开发 □其它

This paper shows how parents may safeguard their children from internet side
effects using the Android application in a very particular sense. The major message of
选题背 this thesis is how to use technology to safeguard children from all forms of adverse
景及目 effects when they are online. The application has been planned and adjusted around these

的 issues so that guardians can effortlessly monitor their children remotely through the
Android working framework. This investigate will concentrate on smartphones, and in
specific the Android working system.
Carefully read the relevant references specified by the instructor, and understand the
author's writing ideas, research methods, and design ideas. Go to the library or search
for information on the Internet, clear the way to solve the problem, and find a solution.

工作任 [01] Wittes, B. Poplin, C. Jurecic, Q. and Spera, C. (2016) “Sextortion: Cybersecurity,

务及要 teenagers, and remote sexual assault”. Center for technology Innovation at Brookings.
[Online].Available:https://www.brookings.edu/wpcontent/uploads/2016/05/sextortion1

-1.pdf [accessed 8 October 2017]

[02] Willard, N. E. (2007). Cyber-safe kids, cyber-savvy teens: Helping young people
learn to use the Internet safely and responsibly. John Wiley & Sons.

1
[03] Seale, C., Silverman, D. (1997). “Ensuring rigour in qualitative research”. European
Journal of Public Health, no 7: 379-384.

[04] Sliverman, D. (2000). Analyzing talk and text. In Handbook of qualitative research.
Editors Denzin, N.K. and Lincoln, Y.S., 2nd edition, Sage Publications, California,
USA. pp. 821- 834.

[05] Jevremovic, A., Veinovic, M., Cabarkapa, M., Krstic, M., Chorbev, I., Dimitrovski,
I., & Stojmenovic, M. (2021). Keeping Children Safe Online With Limited Resources:
Analyzing what is Seen and Heard. IEEE Access, 9, 132723-132732

1、开题报告:2022 年 03 月 15 日
时间安 2、完成初稿:2022 年 04 月 18 日
排 3、完成终稿:2022 年 05 月 12 日
4、答 辩:2022 年 05 月 31 日
以上内容由指导教师填写

教师姓名: 审核意见:
指导教
师签 分院审核
字 分院院长(系主任)签字:

年 月 日 年 月 日

学生接
受任务 接受任务时间: 2022年 3 月 4 日 学生签名:
签字

2
云南工商学院
毕业设计开题报告
学院 智能科学与工程学院 专业及班级 Class 1 of 2018 CST

KAFI MD ISRAFIL 学
姓 名 18L55170016 指导教师 +8801302477978
MOMIN 号

题目名称 Mobile Application for Child Monitoring and Control System

一、选题的依据和意义,研究的主要问题,拟达到的目的:
Despite the many benefits of the Internet, children and adolescents - who are particularly vulnerable due
to their age - face many risks, including: inappropriate content, age-inappropriate content (such as
violent and sex websites) and illegal content. Online games, such as the Blue Whale Challenge,
have been used to persuade young adults to perform a series of "challenges." This research paper
uses Android operating system to solve such problems. With a single client server, parents will be
able to communicate with their children and control them with the help of smartphone's GPS
network. Arrangement for observing children with the assistance of GPS advances. The application
uses three fundamental administrations that are GPS, telephonic administrations, and cast screen.
For area administrations is GPS and communication administrations is SMS, call logs, contacts and
cast screen give guardians when they're remaining with children adjacent at that point they can
observe their portable phone screen specifically on guardians phone. For the most part, has chosen
to work the framework is android to cover all the highlights. The web is utilized for communicating
between the child's side and the parent's side. The Framework can be planned in a straightforward
way. The application was created to create a user-friendly approach on both sides. The reason for
choosing android OS is to target more clients. Parts of people utilizing android versatile phones
these days specify dependent and independent variables in this study.

Here an application will be connected to through two accounts, one for children and another for
parents. Two devices will be connected to each other through two types of accounts. The client will
connect to the server using a GPS network and exchange information. With the Internet connection
the parents will update the children's news via SMS once an hour in the presence of a law
commission whenever the Internet is disconnected. Some more update options have been added to
this application Jalal Unnecessary Advertisement will actually automatically block the value of any
ad-blocker so that children are protected from obscene devotional content and parents can constantly
monitor their children's location through location app tracker option and online. This app has been

3
designed based on the observation of these issues and the current situation. Hopefully this
application will play a big role in avoiding such harmful issues in children and hopefully this
research paper will play a very helpful role in conducting research on this topic in future.

二、研究方法、研究步骤和所需条件:
Research methods: literature research. Find the relevant literature, understand the key points
and steps of Mobile application for Child monitoring and control system, and have a general
understanding of the content of organization design.
2. Research steps: To determine the purpose and problems of the research, the primary
task of literature research is to determine the purpose and problems of the research, and to
make clear whether the literature research method is used as an auxiliary method or an
independent research method in the research project.
3. Required: To determine the purpose and problems of the research, the primary task of
literature research is to determine the purpose and problems of the research, and to make
clear whether the literature research method is used as an auxiliary method or an
independent research method in the research project. Literature collection, to determine the
scope and content of literature collection, in the collection of documents should pay
attention to distinguish the authenticity of documents, and record the source of documents,
standardize the collection of documents. The collation of the literature, the collected
literature is too messy, so it needs to be combed in order to be better used in the research.
4. Describe: There are two stages in the process of literature interpretation. In the first
stage, we strive to browse the literature in a relatively short period of time, the purpose of
which is to locate the literature and facilitate future research and use. The second stage is
accuracy, which defines the real value and significance of the literature and makes a correct
and objective evaluation.
Required conditions: the use of office, Reference’s and other software to improve Child
monitoring and control system.

4
三、研究工作进展计划:
The table below shows a brief description of the project activities through different chapters
against the time schedule as a grant structure.

work/Time MARCH APRIL M MAY


Weeks 1 2 3 4 1 2 3 4 1 2 3
Chapter1: Introduction
Chapter2: Literature review
Chapter3: Methodology
Chapter4: Project implementation

Chapter5: Conclusion
四、主要参考文献、资料:
[1] Hamid, T (2013) “Online Harassment and Digital Stalking” International Journal of
Computer Applications. [Online].Available:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.402.8620&rep=rep1&type =pdf
[accessed 8 October 2017].

[2] Hoofnagle, C. J., King, J., Li, S., & Turow, J. (2010). “How Different are Young
Adults from Older Adults When It Comes to Information Privacy Attitudes and Policies”
Rochester, NY: Social Science Research Network. [Online].Available:
http://papers.ssrn.com/abstract=1589864 [accessed 18 May 2018].

[3] Lundgren, M. (2014). “IS risk practices from a CST perspective: a literature review”.
Master thesis. Luleå University of Technology.

[4] Philips G (2016) ‘7 Ways Your Children Might Bypass Parental Control Software’.
MUO. [Online]. Available: https://www.makeuseof.com/tag/7-ways-children-
mightbypass-parental-control-software/ [accessed 8 May]

[5] Seale, C., Silverman, D. (1997). “Ensuring rigour in qualitative research”. European
Journal of Public Health, no 7: 379-384.

5
[6] Sliverman, D. (2000). Analyzing talk and text. In Handbook of qualitative research.
Editors Denzin, N.K. and Lincoln, Y.S., 2nd edition, Sage Publications, California, USA.
pp. 821- 834.

[7] U.S. Dept of Justice (2010) “The national strategy for child exploitation prevention
and interdiction” U.S. Department of Justice [Online]. Available:
https://www.justice.gov/psc/docs/natstrategyreport.pdf [accessed 8 October 2017]

[8] Willard, N. E. (2007). Cyber-safe kids, cyber-savvy teens: Helping young people.

Learn to use the Internet safely and responsibly. John Wiley & Sons.

[9] Jevremovic, A., Veinovic, M., Cabarkapa, M., Krstic, M., Chorbev, I., Dimitrovski, I.,
& Stojmenovic, M. (2021). Keeping Children Safe Online with Limited Resources:
Analyzing what is Seen and Heard. IEEE Access, 9, 132723-132732.

[10] CyberSafeIreland (2017) “CyberSafeIreland Annual Report”, CyberSafeIreland,


[Online]. Available:
http://cybersafeireland.org/wpcontent/uploads/2017/09/CyberSafeIreland-Annual-Report-
2017.pdf [accessed 6 January 2017].

[11] Fergus, S. (2018). Internet Safety for Children: Stranger danger, misbehavior and
problems when online.

https://melsatar.blog/2012/03/15/software-development-life-cycle-models-and-
methodologies/#:~:text=Waterfall%20Model,-Description

[12] Seale, C., Silverman, D. (1997). “Ensuring rigour in qualitative research”. European
Journal of Public Health, no 7: 379-384.

[13] Wittes, B. Poplin, C. Jurecic, Q. and Spera, C. (2016) “Sextortion: Cybersecurity,


teenagers, and remote sexual assault”. Center for technology Innovation at Brookings.
[Online]. Available: https://www.brookings.edu/wpcontent/uploads/2016/05/sextortion1-
1.pdf [accessed 8 October 2017]

6
审核意见:
同意开题






见 指导教师签名:

年 月 日

A、通过 B、完善后通过 C、不通过


审核意见:





分院院长(系主任)签名:
年 月 日

7
云南工商学院
毕业论文(设计)答辩许可证

经审查, 2022 级 计算机科学与技术 专业 班


同学所提交的毕业论文(计): Mobile application for Child monitoring and control
system,符合学院本科生毕业论文(设计)的有关规定,达到了毕业论文(
设计)任务书的要求,根据《云南工商学院毕业论文(设计)管理办法》
及其它相关文件精神,同意该生提交的毕业论文(设计)参加答辩。

指导教师签字:

年 月 日

毕业设计(论文)指导小组负责人签字:

8
This Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of
Bachelor in Computer science and technology
Graduate School Yunnan Technology and Business University
2022
YTBU. GS. 2022 Bachelor Degree Mobile Application Child monitoring and
control system

Title Mobile application for Child monitoring and control system


Advisor " [Academic Rank, Advisor’s name, Ph.D.]"
Co- Advisor (if any) "[ Academic Rank, Advisor’s name]"
Co- Advisor (if any) "[ Academic Rank, Advisor’s name]"
Co- Advisor (if any) "[ Academic Rank, Advisor’s name]"
Author Name KAFI MD ISRAFIL MOMIN
Program Bachelor Degree in Computer Science and technology
Academic Year 2022

9
Abstract

This paper shows how parents may safeguard their children from internet side effects
using the Android application in a very particular sense. The major message of this thesis is
how to use technology to safeguard children from all forms of adverse effects when they are
online. People in today's world are getting to be increasingly subordinate on online-based
gadgets, so we got to be mindful of this as well as the different unsafe situations on the Web
for ourselves and our children. The application has been planned and adjusted around these
issues so that guardians can effortlessly monitor their children remotely through the Android
working framework. This investigate will concentrate on smartphones, and in specific the
Android working system, the reason is that Android phones can be acquired cheaper than an
iPhone, and thus are more likely to be utilized by a child.

Key words: mobile phone, Android, Control, remotely, safeguard children

10
Acknowledgement

I am pleased to present “Mobile application for Child monitoring and control system”
project and take this opportunity to express my profound gratitude to all those people who
helped me in completion of this project. I thank my college for providing me with excellent
facilities that helped me to complete and present this project. I express my deepest gratitude
towards my project guide for her valuable and timely advice during the various phases in my
project. I count it a special privilege to have her supervise my thesis. My sincere thanks go
to our head of department as well as lecturers in the department and the entire management
for their words of encouragements and support. I would like to thank all my friends for their
smiles and friendship making the college life enjoyable and memorable and family members
who always stood beside of me and provided the utmost important moral support. Finally, I
would like to thank everyone who has helped me directly or indirectly in my project.

KAFI MD ISRAFIL MOMIN

11
Table of Contents
Abstract ................................................................................................................................ 10
Acknowledgement ................................................................................................................ 11
Table of Contents ................................................................................................................. 12
CHAPTER 1......................................................................................................................... 16
Introduction ...................................................................................................................... 16
1.1 Research rational ........................................................................................................ 16
1.2 Research Objectives ................................................................................................... 16
1.3 Hypothesis .................................................................................................................. 17
1.4 Scope of research........................................................................................................ 17
1.5 Research contribution ................................................................................................. 17
1.6 Definitions .................................................................................................................. 18
CHAPTER 2......................................................................................................................... 19
Literature Review ............................................................................................................. 19
2.1 Historical background ................................................................................................ 19
2.2 Focus of the problem .................................................................................................. 21
2.2.1 Online risks for children and young people ........................................................ 21
2.2.3 Risky sexual activities ......................................................................................... 22
2.2.4 Pornography and sexual materials....................................................................... 22
2.2.5 Adult sexual predators ......................................................................................... 22
2.2.6 Privacy ................................................................................................................. 23
2.2.7 Sextortion ............................................................................................................ 26
2.2.8 What to do in the event of cyberstalking............................................................. 27
2.3 Concept and Theory ................................................................................................... 28
2.3.1 Mechanisms of online solicitation....................................................................... 29
2.3.2 Web Site Portals .................................................................................................. 29
2.4 Literature Review ....................................................................................................... 30
2.5 Conceptual Framework .............................................................................................. 30
2.6 Modules and Depiction .............................................................................................. 31
CHAPTER 3......................................................................................................................... 32
Methodology .................................................................................................................... 32
3.1 Research design .......................................................................................................... 32

12
3.2 Gantt chart .................................................................................................................. 34
3.3 Project info cycle details ............................................................................................ 35
3.3.1 Waterfallmodel .................................................................................................... 35
3.3.2 Description .......................................................................................................... 35
3.4 Project design ............................................................................................................. 36
3.4.1 E-R Diagram ....................................................................................................... 36
3.4.2 Use case diagram ................................................................................................. 37
3.4.3 Sequence diagram ............................................................................................... 38
3.4.4 Activity Diagram ................................................................................................. 40
3.4.5 Class Diagram ..................................................................................................... 42
3.4.6 Data Flow Diagram ............................................................................................. 43
3.4.7 DFD Symbols ...................................................................................................... 44
3.4.8 Constructing a DFD: ........................................................................................... 45
3.4.9 Salient Features of DFD’s: .................................................................................. 45
3.5 Data Analysis ............................................................................................................. 46
3.5.1 Types of data flow diagrams ............................................................................... 46
3.5.2 Current physical: ................................................................................................. 46
3.5.3 Current logical ..................................................................................................... 46
3.5.4 New logical ......................................................................................................... 46
3.5.5 New physical ....................................................................................................... 46
3.5.6 Rules governing the DFD’s ................................................................................. 46
3.5.7 Data flow ............................................................................................................. 47
3.5.8 Data Flow Diagrams............................................................................................ 48
3.5.9 System Architecture ............................................................................................ 51
3.5.10 Screenshots ........................................................................................................ 53
CHAPTER 4......................................................................................................................... 62
Project Implementation .................................................................................................... 62
4.1 Project Implementation Technology .......................................................................... 62
4.2 Overview of Technologies Used ................................................................................ 63
4.2.1 Introduction to Android ....................................................................................... 63
4.2.2 Project Structure .................................................................................................. 64
4.2.3 The User Interface ............................................................................................... 65

13
4.2.4 Tool Windows ..................................................................................................... 66
4.2.4 Navigation ........................................................................................................... 67
4.2.5 Multiple APK Support ........................................................................................ 68
4.2.6 Code inspections ................................................................................................. 70
4.2.7 Feasibility Report ................................................................................................ 70
4.3. Testing ....................................................................................................................... 73
4.3.1 Levels of Testing ................................................................................................. 73
4.3.2 Coordination Testing ........................................................................................... 74
CHAPTER 5......................................................................................................................... 78
Conclusion........................................................................................................................ 78
References ............................................................................................................................ 79
Appendix .............................................................................................................................. 81
Appendix A: Interview Guide .......................................................................................... 81
Appendix B: Questionnaire .............................................................................................. 83
BIOGRAPHY....................................................................................................................... 85

14
List of Figures
Figure 1: connection design between phone Gps and database ........................................... 33
Figure 2: Gantt chart ............................................................................................................ 34
Figure 3: WaterfallModel ..................................................................................................... 35
Figure 4: E-R Diagram design ............................................................................................. 37
Figure 5: Use Case Diagram of Parent ................................................................................. 37
Figure 6: Use Case Diagram of Child .................................................................................. 38
Figure 7: Sequence Diagram of Parent ................................................................................ 39
Figure 8: Sequence Diagram of Child .................................................................................. 40
Figure 9: Sequence Diagram of Parent ................................................................................ 40
Figure 10: Activity Diagram of Child .................................................................................. 41
Figure 11: Database Detail ................................................................................................... 48
Figure 121 Level 1 DFD ...................................................................................................... 49
Figure 13: 2 Level 2 DFD: Prediction .................................................................................. 50
Figure 14: System Architecture............................................................................................ 51
Figure 15: System Architecture............................................................................................ 52
Figure 16: Login Page .......................................................................................................... 53
Figure 17: Signup page ........................................................................................................ 54
Figure 18: Home Page .......................................................................................................... 55
Figure 19: Call Log Page ..................................................................................................... 56
Figure 20: Activity Check List page .................................................................................... 57
Figure 21: SMS Check List Page ......................................................................................... 58
Figure 22: Tracking Page ..................................................................................................... 59
Figure 23: Cast Screen ......................................................................................................... 60
Figure 24: Browser History List Page .................................................................................. 61
Figure 25: Main_Activity.java ............................................................................................. 66
Figure 26: Performance monitors......................................................................................... 69
Figure 27: Inspection Result Page........................................................................................ 70

15
CHAPTER 1
Introduction
There's a growing demand for smartphones in today's world. Individuals of all ages are
using it easily, beginning with adults. When smartphones are associated with the Web, we
ought to pay attention when it comes to unexpectedly lurch over uncivilized pictures and
how prepared to induce spam emails extending from tricks to fake pharmaceuticals with
completely dishonorable content in fact for adults. And this paragraph has been displayed
with our children in mind. Here's how we are able effectively secure kids from the terrible
side of the Internet with the Android working framework.

1.1 Research rational


The Internet is one of the most talked-about and critical topics in today's world. By
using this internet people are picking up information and the ability to appear their skills to
the world very effectively. Especially within the Covid-19 situation where school-college is
closed all the kids have ended up additional dependent on smart gadgets and the internet as
they are sitting at home and they are using their leisure time to entertain and play online
games and secure different sorts of information. And presently it has ended up their habit
and it carries both great and terrible for children. Indeed, for adults, we know the way ready
to incidentally bumble over unseemly pictures and how we will get spam emails extending
from scams to fake pharmaceuticals with totally improper content even for adults. Since the
current Internet isn't secure for children, guardians in families with smart gadgets and
Internet connections are stressed about their children. This thesis analyzes in detail how these
accounts will be connected to each other and how data will be executed remotely and how
guardians will be able to protect their children. The major message of this thesis is how to
use technology to safeguard children from all forms of adverse effects when they are online.

1.2 Research Objectives


1. Track and discover out the area of child
2. checking children what they are doing online by examining browser history and
treats
3. Observing what their kids are doing with the assistance of cast screen choice
through nearby area

16
4. Any malevolent e-mails or any fake phone calls from children to the phone can
actually be alerted to the parent's phone through instant messaging.

1.3 Hypothesis
Children who are characterized as 12 a long time and more energetic who are utilizing
the net are revealed to data not all of it fitting or incredible for them when being so youthful
guardians and gatekeepers have duties to keep them secure from what is disgraceful be that
because it may children as seen inside the cybersafe Ireland 2017 report truly do things on
the web that they do not prompt the gatekeepers or guardians nearly there are parental
controls that are arrangements for the circumstances and the android application may be a
culminating way to clarify this issue. I have attempted to solve this issue with the Android
working framework analyzed in this paper.

1.4 Scope of research


The solution proposed in this project takes advantage of the rich features offered in androids
smartphones the architecture of the system is built on three main components GPS satellite
telephony services and cast screen option to watch live children’s phones screen when there
staying home or nearby activities developing this project would not have been possible
without studying related and existing works some of these works rely on internet
connectivity or a server that has to be up running the proposed system relies only on two
main services telephony and location finally like any software product or design there is still
room for enhancement features can be added to enhance the system such as geo-fencing
emergency alerts and many others.

1.5 Research contribution


When I started researching online child assurance I took note that numerous
comparable people have revived this topic but we ought to use more effective innovation for
child security since our technology is continually being upgraded. My goal in strengthening
the protection of children while on the Internet is expressed in this research paper. This whole
research is based on online investigation and the critical current state of social media. Has
contributed impressively to my investigation of various platforms and social media.

17
1.6 Definitions
This research targets to assist guardians who cannot manage to spend time with their
children at home, and who have smart gadgets and Internet connections, to keep kids away
from all the risky things on the internet so that guardians can remotely control and monitor
their children by using android devices, this is the main goal of this thesis.

18
CHAPTER 2
Literature Review
2.1 Historical background
The game spread around the world and over 130 children were contaminated with the
diversion passed on all over the world and their age was 09 to 18 this diversion unconsciously
spread all over the world checking Bangladesh and financial for children and i have chosen
the subject of my proposal child security when children are online regularly an online-based
suicide android diversion called --blue whale challenge-- which the total world was able to
secure but in that case it was as well late for me Wikipedia reports June 2018 the diversion
spread around the world and over 130 children tainted with the diversion passed on all over
the world and their age was 09 to 18 this diversion unwittingly spread all over the world
tallying Bangladesh and China.

Example pictures of the game

Bangladesh:

Despite many news reports published in Bangladeshi media attempting to link


suicides with the game, no case has been officially confirmed. In October 2017, Bangladesh
Home Minister Asaduzzaman Khan stated that the Bangladesh Telecommunication
Regulatory Commission has been directed to investigate the Blue Whale game after reports
of suicide around the country BTRC released a notice urging people to call a specific number
if any web link or any information related to the Blue Whale game were to be found. Later
that month, the Bangladeshi High Court ordered a six-month ban on special night-time
internet packages provided by various mobile operators across the country in order to curb
suicides resulting from the game. (Information collect from (https://en.wikipedia.org/))

19
China:

In May 2017, Tencent, China's largest Internet service portal, closed 12 suspicious
Blue Whale-related network groups on its social networking platform QQ. It said that the
number of this kind of group is on the rise. The search results of related keywords were also
blocked. (Information collect from (https://en.wikipedia.org/) I have investigated all these
issues in detail online and I have done this inquiry to solve it individuals in today's world are
using Android devices more since it is available at a reasonable price so kids are presently
using these phones and kids from different online-based stages. Faced with all kinds of
obscenities and dangerous types of fraud and hurtful things, in this manner we ought to think
exceptionally entirely approximately the security of children and we require administration
initiatives to protect them. Keeping children secure online incorporates keeping them
protected from seeing fabric which is reasonable as it were for grown-ups, there's moreover
fabric which is unlawful which children may accidentally experience while surfing the
Internet. We ought to ensure that no conversation ought to develop which is inappropriate
or that improper language is used while a child is on the Web is additionally imperative. In
this case, guardians are attempting to play an active role in ensuring them in today's world
and this application is outlined to assist them through which guardians will be able to screen
and secure their children around the clock.

If parents knew about the benefits of such an application, maybe 130 kids in our
world wouldn't have died when the Blue Whale game was coming. Moreover, this
android application employments GPS and telephony administrations, and GPS offers
assistance in finding the lost child’s area by the overview of lost children in 2004 there add
up to 5996 children are lost suka society Jan 16, 2011, news conclusion out of these as it
were 4092 children return or were found by police be that as it may 1904 children are missed
and the children ages 14 a long time and 17 a long time are missed or ran absent from
domestic the guardians are stressed almost their children by lost the children the guardians
are frightened to go on the family trip there are parts of chances to miss the child on the trip
the venture is created for those guardians that they have stressed to miss their child in
today’s world parts of children have smartphones with the help of smartphones GPS based
following android (Apk) application guardians can observe their children GPS is combined
with GPS-based SIM cards on portable to observe a child’s area the GPS employments

20
longitude and scope to track the area the SMS brief message benefit is utilized to
communicate child side and parent side applications SMS benefit is used when smartphones
don't bolster web network the framework is able to send the child’s smartphones correct
area to the parent's smartphone when the parent request to check the child’s location

2.2 Focus of the problem


2.2.1 Online risks for children and young people

Despite the many benefits of the Internet, children and young people – who are
particularly vulnerable due to their age – face a number of risks, including: Inappropriate
content, including age-inappropriate content (such as violent and sexual websites) and
illegal content. Online games such as the Blue Whale Challenge have been used to provoke
young adults to carry out a series of ‘challenges’ – some of which are life threatening – are
particularly harmful; Inappropriate contact, including being the victim of bullying,
grooming, and harassment; Inappropriate conduct, including sexting, self-generated
explicit material that is shared with others, sexual harassment, and the bullying of others.
Such conduct often leads to reputational damage; Commercial issues, including spam,
hidden costs (such as in-app purchases), inappropriate advertising, and data collection
which infringes on children’s rights.

21
2.2.3 Risky sexual activities

Risky sexual exercises include circumstances in which people show security dangers
to young individuals and circumstances in which youthful individuals themselves lock-in
in into behavior that causes concern.

2.2.4 Pornography and sexual materials

One concern approximately online pornography and other sexual materials are a
coincidental untimely presentation of these materials by more youthful children and
coincidental get to by teens. We will assume that numerous, in the event that not most, high
scholars will be inclined to spend some time looking at online erotica. Typically an issue
that families will handle differently in agreement with their family values. The more critical
issues for all guardians of youngsters are online exercises that go past ordinary sexual
interest to intemperate, addictive get, particularly get too pornographic fabric that includes
viciousness or is child pornography.

2.2.5 Adult sexual predators

Adult sexual predators seduce young people who they contact through public online
communication services with the objective of arranging for a sexual liaison or obtaining
child pornography. Unfortunately, sometimes teens engage in unsafe or irresponsible
behavior that is highly likely to attract the attention of these adult sexual predators. It appears
that some adult sexual predators seek more naïve and innocent young people, whereas others
simply troll for teens who welcome such contacts. We are constantly confronted with
these unpleasant things online and are being cheated on. In addition to this, our
children are exposed to these insecure things and this study has been done to keep
these things away from children and also discuss how to prevent it. I have taken all
of the above issues from my personal online research and have monitored the validity of
each issue through observation and tried to find out how to solve the problem by presenting
the problem to the world through the Android application. In addition to this, the literature
review started by searching for articles, mainly by using Google Scholar and the university’s
library services.

22
2.2.6 Privacy

Privacy is a part of the CIA group of three, however youngsters' security is vital when
online henceforth why a writing search was additionally done regarding this matter.
Acquits, et al., (2015) in their survey express that in the event that this is the period of data,
security is the issue of our times. Interests, characteristics, convictions, and goals that were
once private or imparted to the couple of now leave trails of information that uncovered
them. Clients impart utilizing messages, texts, and web-based entertainment celebrating
infants, and grieve the departed utilizing their online entertainment profiles. Certain
individuals do internet dating and track down accomplices; teach themselves with online
courses; clients look for replies to unremarkable and delicate inquiries; read news also,
books; explore roads with geotracking frameworks. Via completing these and other
exercises, clients uncover data to each other, to business elements and to different
legislatures maybe accidentally. The observing of individual data is pervasive; its capacity
is so strong as to leave your set of experiences and past undeletable. With this speed increase
in information assortment are consistent headways in the capacity to total, examine, and
draw touchy surmising’s from this accumulated information on people. Organizations
furthermore, people can profit from the sharing of information that was once covered up
and through the utilization of more modern investigation to bigger and more interconnected
data sets. The article expresses that society all in all can profit from the sharing of
information what’s more, a model is given of electronic clinical records which are
consolidated to notice novel medication collaborations. There are obviously issues with the
potential for individual information being manhandled for monetary and social segregation,
stowed away impact and control, pressure, or restriction of these are on the whole
unsettling. This disintegration of security can compromise our independence, as shoppers
as well as residents. Sharing more private information does not be guaranteed to constantly
convert into more advancement, productivity, or uniformity. Due to the fast nature of these
turns of events, there has been significant discussion about clients' capacity to explore a
quickly advancing security scene, and the thing to do about protection at an arrangement
level. A trust their own capacity to settle on conclusions about data uncovering and hold
back. Individuals with these perspectives will generally see administrative security of
protection as impeding the progressions of data advances also, the advantages that these

23
innovations might bring. Certain individuals are worried about the capacity of people to
oversee protection in the midst of progressively complex compromises. Individuals feel
they never again have sufficient security involving customary apparatuses for protection
Dynamics like decision and assent. The audit expresses that rather than personal Obligation,
administrative intercession might be expected to adjust the interests of the Subjects of
information against the force of business elements and state-run administrations holding
that information. The survey portrays how individuals deal with the limits between their
private and public internet-based presence in various ways: which incorporate separateness,
hold, or namelessness or by safeguarding individual data and through trickery and
dissimulation. Individual’s layout such limits for some, reasons, including the requirement
for closeness and mental break and the longing for security from social impact and control.
The survey expresses that occasionally these inspirations are so instinctive and basic that
protection looking for arises quickly and normally. This can frequently be the situation
when actual security is barged in on, at different time’s individuals experience impressive
vulnerability about whether, and the amount, they ought to be worried about protection.
Hoofnagle, et al., (2010) composed a paper on how youthful grown-ups vary from more
seasoned grown-ups with regards to data security mentalities and strategies. The age bunch
is marginally more seasoned than the age profile this theory is focused on. As Hoofnagle,
et al., (2010) alludes to media reports with accounts of youngsters transferring scurrilous
photographs and sharing them on the web, youngsters gloating about liquor fueled offenses
on interpersonal interaction locales, and furthermore publicizing different ventures that they
might lament from here on out. These occasions are mixed up as addressing an age-wide
change in mentality toward data protection. Analysts thusly erroneously guarantee that
youngsters are less worried about keeping up with protection than more seasoned
individuals are. As individuals age, they will quite often turn out to be more careful as
alluded to in the report that one mental investigation discovered that teenagers (matured 13-
16) and what they named "adolescents" (those matured 18-22) are more disposed to be
engaged with a hazardous way of behaving and dangerous decision making than 'grown-
ups' are (those more seasoned than24 years). The investigation discovered that companion
impact assumes a significant part in making sense of unsafe conduct during pre-adulthood.
The finding was more articulated among youths than among the adolescents, however,
contrasts among young people and grown-ups were striking in eagerness to face challenges,

24
especially when bunch conduct was involved. The paper makes sense that schooling might
be helpful, however, numerous youthful grown-ups are presented to instructive programs
about the Internet, however, the emphasis is on private wellbeing from online hunters
furthermore, cyberbullying with little accentuation on data security, and protection. The
report infers that youthful grown-up surely are not quite the same as more seasoned grown-
ups with regard to the information on security regulations. Youthful grown-ups are bound
to accept that the law secures them both on the web and off. This absence of information
on security and protection in an enticing climate, as opposed to an absence of concern with
respect to security, might be significant explanation huge quantities of youngsters draw in
with the advanced world in an apparently uninterested way. The only instruction is likely
insufficient for youthful grown-ups to arrive at the right levels of protection. The report
says that youthful grown-ups likely need numerous types of help from different quarters of
society, including the administrative field, to adapt to the complex online flows that intend
to go against their best security impulses. Hanna, et al., (2007) in their article allude to how
each time a client visits a site, a client leaves an electronic follow that can later be recovered
and broken down. Utilizing innovation to store recognizing data, for example, treats, Web
webpage administrators can benefit from this data by combining these profiles with other
segment information. A Violation of 12 security happens when an association, while it is
completing the organization targets, gathers, stores, controls, or sends individual data
obscure to the person. The article in its decision expresses that associations might have the
means to effectively deal with the protection worries of their clients. The outcomes show
that protection arrangements are esteemed by clients. Associations can gain from this by
expressing their security strategy all the more noticeably. The article likewise expresses
that the advantages of expanding comfort are expanded esteem presented through
personalization and bringing down of frictional expenses. It too creates the impression that
comfort likewise has an advantage that has been disregarded, which is alleviating protection
concerns. Monetary motivations are additionally an enticing means to evoke individual
data. The exploration has shown that individuals will uncover individual data for gifts and
so on. Kelsey and McCauley, (2008) allude to a survey completed by the Consumer Reports
Public Research Center showed that American residents are worried about how is being
managed their own data on the web. The report portrays how over a third (35%) in the
survey utilized another email address to try not to give genuine data. More than a quarter

25
(26%) of individuals in the survey have utilized a product arrangement that conceals their
character, and one-quarter have given counterfeit data to access a site (25%). In the survey
the customers knew that data about their riding propensities was being gathered on the web,
however, a considerable lot of them didn't know what organizations can do with this data.

2.2.7 Sextortion
As per Watts, et al (2016) there is, lawfully talking, no such thing as sextortion. The
word is a benevolent a legal shoptalk for a class of clearly criminal lead that as a general rule
compares flawlessly with no known criminal offense. Sextortion cases are in some cases
arraigned under youngster erotic entertainment regulations, once in a while as PC
interruptions, in some cases as following. Watts, et al. (2016) portray it as sextortion which
is essentially equivalent to antiquated coercion or extortion, completed over a PC network,
including a danger to the person in question, for the most part yet not dependably to
physically deliver express pictures of the person in question, assuming the casualty will not
participate in that frame of mind of further sexual action. Watts, et al. (2016) completed an
examination of a sum of 78 cases, in 52 various wards, 29 states or domains, and three far
off nations. 55 of those cases (71%) include just minor casualties. An extra 14 (18 percent),
by contrast, include a blend of both minor casualties and grown-up casualties, in nine cases
(12 percent), every one of the recognized casualties were grown-ups. We can see countless
occurrences with minors. . (2016) did an investigation of a sum of 78 cases, in 52 various
purviews, 29 states or regions, and three outside nations. 55 of those cases (71%) include
just minor casualties. An extra 14 (18 percent), by contrast, include a blend of both minor
casualties and grown-up casualties, in nine cases (12 percent), every one of the distinguished
casualties was grown-up. We can see countless occurrences with minors. (Wittes, et al.
(2016) on page 8 give the following stats on their results for Sextortion:)

• The results showed that in 78 percent of the incidents, they involved female
children and 12 percent involved male children (In 10 percent of incidents,
child gender could not be determined);
• The results showed that in 78 percent of the incidents, they involved female
children and 12 percent involved male children (In 10 percent of incidents,
child gender could not be determined);

26
• The results showed that in 22 percent of cases, the reporter doing the report
mentioned that they were suspicious of, or knowing that, multiple children were
targeted by the same offender.

Wittes, et al. (2016) state that based on the information known by the CyberTipline reporter,
sextortion appears to have occurred with one of three primary objectives (however in 12
percent of reports, CyberTipline were unable to determine the objective)

• Wittes, et al. (2016) state that based on the information known by the
CyberTipline reporter, sextortion appears to have occurred with one of three
primary objectives (however in 12 percent of reports, CyberTipline were unable
to determine the objective)
• The perpetrator wished to get money from the child (6 percent);
• The perpetrator wanted to have sex with the child (6 percent).

2.2.8 What to do in the event of cyberstalking

Hamid (2013) prescribes that in case cyberstalking happens, the casualty spares all of
the communication prove, without changing or altering, for future reference. On the off
chance that your Email has the office for Mail sifting, the casualty ought to caution the
stalker to halt and 18 then square him/her. In the event that the stalking proceeds, employing
a diverse e-mail address, the casualty should consider reaching the Web Administrations
Supplier (ISP) and report the occurrence to a law firm and a cyberstalking helpline. In the
event that the online fabric shows up to show a legitimate inescapable risk of savagery and
threat to others, contact the police, and initiate a defensive reaction from the police.

27
The taking after are common rules for cyberstalking security. Evaluate what online
information exists almost you utilizing Web look motors like Google; alter your email and
passwords as often as possible for critical and regularly utilized online accounts and keep
them secure; survey all security and security settings in your computing gadget; maintain a
strategic distance from open forums; restrain what you share on the Web particularly
individual data, photographs, videos. Teach your companions, family and work colleagues;
accumulate prove once you discover it; report to police; look for offer assistance and bolster
from charities like wrongdoing victims’ helpline. To resolve a cyberstalking issue may
moreover incorporate a mechanical arrangement, for illustration parental control settings or
extraordinary parental control program, which offer assistance guardians to channel Emails
and chat rooms, square undesirable messages and messages gotten from obscure sources,
web sifting can too be used to confine get to a few destructive web destinations.

Mysterious remailers and browsers assist diminish the probability of potential stalkers being
able to recognize casualties. A few stalkers acting as programmers to abuse working
frameworks and program applications vulnerabilities, can introduce spyware and other
checking software to take after the casualty. Hamid (2013) states that Organize Security
Arranging Engineering (Net SPA) and other attack charts and vulnerabilities scanners can
offer assistance settle these sorts of issues by applying special patches which now not permit
assailants to get to other computers. A few stalkers, use IP Scanners programs which are
unreservedly accessible on the Web, to check a run of IP addresses for open ports or back
entryways to misuse and pick up get to the child’s computers for observing and following.
There are numerous specialized fixes to illuminate these assaults, for example utilizing NAT
and PAT, mapping open IP addresses to a run of private ones.

2.3 Concept and Theory


Beginning from course readings on data security (e.g., Stallings and Brown, 2014), I
found that the client security subject would be fitting to this think about. The other subjects
were ‘define layers of client’ and ‘Internet and Server in data security’, but those are not
significant for the chosen point. The reading material supported how to apply client security.
In expansion to this, the writing survey begun by searching for articles, primarily by utilizing
Google Researcher and the online, the theory will include programming testing to assess
how viable parental control programming is, and conceivable outcomes of it being hacked.

28
This exploration will focus on cell phones, and specifically the Android working framework,
the explanation is that Android telephones can be bought less expensive than an iPhone, and
accordingly are bound to be utilized by a child. A designer's rendition of Android can
likewise be arranged to run it in a virtual machine running on a PC which makes different
testing conceivable. The theory will likewise include looking into other association's
exploration and discoveries and how it thinks about to my own examination. The postulation
will offer guidance on the best way to push ahead corresponding to guarding child on the
web.

Mechanisms of online solicitation


In the accompanying conversation, we portray the innovative approaches that hunters
could use to lay out a web-based relationship with a youngster or a juvenile. Basically, there
are two different ways for a hunter to utilize the Internet to lay out a relationship for the
motivation behind requesting: email and texting (or talking). Following starting contact, the
hunter could utilize other technological means to heighten the preparation system, for
example, acquiring admittance to the adolescent's Web website or introducing obscene
material. In any case, beginning correspondence is generally handily worked with through
email and texting. These two methods for correspondence are helpless against virtual
listening in by innovatively mindful people whose objective is to lay out disconnected
contact. What follows is a portrayal of a portion of the manners by which an internet-based
hunter could get sufficiently close to kids' very own data and communication over the
Internet.

Web Site Portals


As well as utilizing Ethernet sniffers to assemble data about a kid, a hunter could
likewise determine data through a Web site made by the kid. For example, Yahoo! considers
the simple making of free Web locales (e.g., http://www.geocities.com) that can be utilized
to show individual data, for example, name, email address, phone number, place of
residence, and some other information. These Web locales might be deftly made to
incorporate, as a matter of fact, insights concerning leisure activities, bunch locales that
arrange with those interests, and explicit data about the youngster. These locales may

29
likewise be developed for nothing, requiring just approval, a free username, and a secret
phrase from the supporting Web webpage gateway (FreWebspac Directory, n.d.). Assuming
a hunter determines the account name of a designated youngster (by means of talk, for
example), it is not difficult to decide if the kid has posted any extra private data on the Web
website entryway. This data, thusly, may be utilized as a way to work with correspondence
with youth through trickery by guaranteeing comparative interests (Walk et al., 2003).

(Dombrowski, S. C., Lemony, J. W., Aria, C. E., & Dickson, S. A. (2004). Protecting children
from online sexual predators: technological, psych educational, and legal
considerations. Professional Psychology: Research and Practice, 35(1), 65.)

2.4 Literature Review


There are a number of applications that are very similar to this research paper in
collecting specific information for this research but these applications only provide
security to the children through client server through which the exchange of information is
possible but this research paper's The main objective is how parents can monitor and
control the protection of children's Android devices. Parents can track children, third-party
applications through ad blocking system cannot be installed on children's devices that are
harmful to children. And advertising will refrain from.

2.5 Conceptual Framework


This created extended work for guardians of their children. The guardians and children
both ought to have GPS Based shrewd phones. The application is utilized to track the Child's
area as well as call logs, messages, cast screen option and contact from their smartphone.
The reason for choosing android OS is to target more clients. Parts of people utilizing
android versatile phones these days specify dependent and independent variables in this
study.

30
2.6 Modules and Depiction
The system comprises 2 major modules with their sub-modules as follows:

01. Parent:
a. Register: Parents need to register themselves by filling up basic
registration details and by creating valid login
b. Login: After successful registration, parents need to log in using their valid
login credentials.
c. Include/ View Child Details: Once the parent is logged into the
application, he/she can include their children's subtle elements. The
parent can see their included children.
d. View: Once the child's subtle elements are included, a parent can see
different points of interest from the child’s smartphone as takes after:
i. Call Logs: This shows all the later call logs from the child’s
smartphone.
ii. Messages: This shows all the messages from the child’s
smartphone.
iii. Location: This shows the area of the child’s smartphone.
iv. Contacts: Displays all the contact from the child’s smartphone.
v. Cast Screen: Parents can see children Phone screen when there
nearby
02. Child:
a. Login: Registered children need to log in using valid login credentials.
b. Use Calculator: After successful login, a fully functional calculator will be
displayed which can be used by the child itself.

31
CHAPTER 3
Methodology
The nature of the issue in a ponder coordinates the choices of strategies. This think
addresses issues that can happen on the Web for children and ways to moderate such
violations of security. This implies that the think about looks for data related to peoples’
interpretations of diverse circumstances, hence the experimental information is subjective
(Seale and Silverman, 1997). Related to this approach is the impediment of expansive test
information collection as is anticipated in quantitative thinks. All things considered, when
the exertion is to get its activities, discernments, demeanors, and so on a subjective approach
is prescribed (Seale and Silverman, 1997). Ponders that make an exertion to have an impact
on hone are common in data systems investigation (Baskerville and Myers, 2004). Moreover,
a practice-based approach has been investigated to contribute to data security (Lundgren,
2014). Activity research may be a strategy that's straightforwardly pointing to understanding
and tackling commonsense issues, simultaneously moreover contributing to the logical body
of information (Baskerville and Myers, 2004). Activity inquiry about builds upon beginning
with distinguishing the social circumstance or issue, and moment, bringing almost a
collaborative to alter (Baskerville and Myers, 2004). This proposition applies the
fundamental rationale for such a technique, whereas may not be completely taken after the
activity investigates two-step preparation. The exercises to gather data for this think have
been by doing a writing audit, completing a survey, and performing interviews. Moreover, a
Web look and possess experimenting with the program has been utilized to pick up
information on almost the chosen subject.

3.1 Research design


Arrangement for observing children with the assistance of GPS advances. The application
uses three fundamental administrations that are GPS, telephonic administrations, and cast
screen. For area administrations is GPS and communication administrations is SMS, call
logs, contacts and cast screen give guardians when they're remaining with children adjacent
at that point, they can observe their portable phone screen specifically on guardians’ phone.
For the most part, has chosen to work the framework is android to cover all the highlights.
The web is utilized for communicating between the child's side and the parent's side. The

32
Framework can be planned in a straightforward way. The application was created to create
a user-friendly approach on both sides.

Figure 1: connection design between phone Gps and database

The architecture consists of two sides. To begin with is a parent side and another is a child
side. The parent side acts as the server and the child side acts as the client. Basically, there
are two android phones one is on the child's side and the other is on the parent's side. The
parent’s side uses an android application service for communicating to the child’s mobile
and with the help of the mapping parent used to view the child’s location on the map. That’s
why it employments internet and communication services to empower at parent side to track
the child’s area. On the child’s side, another android phone supports GPS and other
telephonic facilities. The child side uses an android application to communicate with the

33
parent side. The child needs to log in using an android application and after successful login,
a fully functional application will be displayed to the child to operate. On the child side,
location services that are GPS are empowered and running on the child side. And parent side
uses internet connectivity to view the child’s location on the map. At parent, side
requirements are mapped for tracking and service (listener) for listening to messages coming
from the child’s side. On the child’s side listener service always runs in the background, at
the parent side used to send commands for location, message, call logs, and contact list from
the child’s smartphone.

3.2 Gantt chart

Figure 2: Gantt chart

34
3.3 Project info cycle details

3.3.1 Waterfall model

Figure 3: WaterfallModel

3.3.2 Description

The Waterfall Model could be a direct consecutive stream. In which advance is seen
as streaming relentlessly downwards (like a waterfall) through the stages of software
implementation. This implies that any stage within the improvement handle starts as it were
on the off chance that the previous stage is total. The Waterfall approach does not
characterize the method to go back to the last stage to handle changes in prerequisites. The
Information cycle approach is the most punctual approach that was utilized for computer
program advancement.

35
3.4 Project design

3.4.1 E-R Diagram

36
Figure 4: E-R Diagram design

3.4.2 Use case diagram

Figure 5: Use Case Diagram of Parent

37
3.4.3 Sequence diagram

Figure 6: Use Case Diagram of Child

38
Figure 7: Sequence Diagram of Parent

39
Figure 8: Sequence Diagram of Child

3.4.4 Activity Diagram

Figure 9: Sequence Diagram of Parent

40
Figure 10: Activity Diagram of Child

41
3.4.5 Class Diagram

New Registration
PARENT
- Login id : String
- Name : String
- Password : String
- DOB : Int
- Gender : String
+ Login ()
- Address : String
+ btn_Click ()
- Mobile No.: Int
+ Logout ()
- Email id : String

CHILD - Login id : String


- Password : String

- Id : String
- Password : String

+ Submit ()
+ Login ()
+ btn_Click ()
+ btn_Click ()
+ Logout ()

42
3.4.6 Data Flow Diagram

A data flow diagram is a graphical device utilized to depict and analyze the
development of information through a framework. These are the central instrument and the
premise from which the other components are created. The change of information from input
to yield, through handled, maybe portrayed coherently and autonomously by physical
components related to the framework. These are known as coherent information stream
graphs. The physical information stream graphs appear to be the genuine actualizes and
development of information between individuals, divisions, and workstations. A full
description of a framework really comprises a set of information stream graphs. Utilizing
two commonplace documents, Yourdon, Gene, and Sarsen’s documentation creates the
information stream graphs. Each component in a DFD is labelled with an expressive title.
Prepare is encouraged, distinguished with a number that will be utilized for a recognizable
proof reason. The improvement of DFDs is tired a few levels. Each preparation in lower-
level charts can be broken down into a more point by point DFD within the following level.
The lop-level graph is regularly called the setting chart. It comprises a single prepared bit,
which plays a crucial part in considering the current framework. The method within the
setting level diagram is detonated into other preparations at the primary level DFD. The
thought behind the blast of a handle into more preparation is that understanding at one level
of detail is detonated into more noteworthy detail at another level. It was typically done until
an assist blast is vital and a satisfactory sum of detail is portrayed for the investigator to get
it the process. Larry Constantine, to begin with, created the DFD as a way of communicating
framework prerequisites in a graphical form. This led to the measured plan. A DFD,
additionally known as a "bubble chart", has the reason of clarifying framework prerequisites
and recognizing major changes that will end up programs in the framework plan. So, it is the
beginning point of the plan to the least level of detail. A DFD comprises an arrangement of
bubbles joined by information streams within the framework.

43
3.4.7 DFD Symbols

In the DFD, there are four symbols

1. A square defines a source (originator) or destination of system data.


2. An arrow identifies data flow. It is the pipeline through which the
information flows
3. A circle or a bubble represents a process that transforms incoming data flow
into outgoing data flows.
4. An open rectangle is a data store, data at rest or a temporary repository of
data

Process that transforms data flow.

Source or Destination of data

Data flow

Data Store

44
3.4.8 Constructing a DFD:
Several rules of thumb are used in drawing DFDs:

1. Process should be named and numbered for easy reference. Each name should be
representative of the process.

2. The flow direction is from top to bottom and from left to right. Data traditionally
flow from the source to the destination, although they may flow back to the original. One
way to indicate this is to draw a long flow line back to ahead. An alternative method is to
repeat the source symbol as a destination. Since it is used more than once in the DFD, it is
marked with a short diagonal.

3. When a process is exploded into lower-level details, they are numbered.

4. The names of data stores and destinations are written in capital letters. Process and
dataflow names have the first letter of each word capitalized

A DFD typically shows the minimum contents of the data store. Each data store should
contain all the data elements that flow in and out.

Questionnaires should contain all the data elements that flow in and out. Missing interfaces
redundancies and like are then accounted for often through interviews.

3.4.9 Salient Features of DFD’s:

1. The DFD shows a progression of information, not control circles, and choices are
controlled contemplations that don't show up on a DFD.

2. The DFD doesn't show the time factor associated with any interaction, whether the
information streams happen day to day, week by week, month to month, or yearly.

3. The succession of occasions isn't brought out on the DFD.

45
3.5 Data Analysis
3.5.1 Types of data flow diagrams

1. Current Physical
2. Current Logical
3. New Logical
4. New Physical
3.5.2 Current physical:

In Current Physical DFD, process marks incorporate the name of individuals or their
positions or the names of PC frameworks that could give a portion of the general framework
handling names, including recognizing the innovation used to deal with the information.
Likewise, information streams and stores are frequently marked with the names of the real
actual media on which information is put away, for example, document envelopes, PC
records, business structures, or PC tapes.
3.5.3 Current logical

The actual parts of the framework are taken out however much as could reasonably be
expected. This framework is diminished to quintessence to the information and the
processors change them paying little heed to real actual structure.

3.5.4 New logical

This is actually similar to a present legitimate model; on the off chance that the client
was totally content with the usefulness of this framework yet disapproved of the way things
were carried out, commonly, the new sensible model will contrast with this coherent model
while having extra capacities, outright capacity evacuation and wasteful streams perceived.

3.5.5 New physical

The modern physical speak to as it were the physical execution of the modern
framework.

3.5.6 Rules governing the DFD’s

1) No preparation can have as it were

46
2) No preparation can have as its input. In case a question has as it were inputs, at that
point, it must be a sink.

3) A handle includes a verb state name.

Data store
1) Data can't move straightforwardly starting with one information store then onto the
next information store; a cycle should move information.

2) Data can't move straightforwardly from an external source to an information store, a cycle
that gets, should move information from the source and spot the information into the data
store

3) An information store has a thing expression name.

Source or Sink
The beginning and/or objective of information.

1) Data can't move critically from a source to sink it should be moved by cycle

2) A source and/or sink a thing expression land

3.5.7 Data flow

1) A Data Flow has just a single course of stream between images. It might stream in the
two bearings between a cycle and an information store to show a read before an update. The
last option is generally demonstrated, be that as it may, by two separate bolts since these occur
at an alternate kind.

2) A participant in DFD implies that the very same information comes from any of at least
two unique cycles of information put away or sank to a typical area.

3) An information stream can't go straightforwardly back to a similar interaction it leads.


There should be undoubtedly another cycle that handles the information stream and produce
a few different information streams that profit from the first information in the starting
system.

4) A DataStream to an information store means to refresh (erase or change).

5) An information Flow from an information store means to recover or utilize.

47
3.5.8 Data Flow Diagrams

Figure 11: Database Detail

48
Figure 121 Level 1 DFD

49
Figure 13: 2 Level 2 DFD: Prediction

50
3.5.9 System Architecture

Figure 14: System Architecture

51
Figure 15: System Architecture

52
3.5.10 Screenshots

Figure 16: Login Page

53
Figure 17: Signup page

54
Figure 18: Home Page

55
Figure 19: Call Log Page

56
Figure 20: Activity Check List page

57
Figure 21: SMS Check List Page

58
Figure 22: Tracking Page

59
Figure 23: Cast Screen

60
Figure 24: Browser History List Page

61
CHAPTER 4
Project Implementation
4.1 Project Implementation Technology
The Extend application is stacked in Android Studio. We used Android Studio for the
Plan and coding of the venture. Made and kept up all databases in SQL Server 2008, in which
we made tables and composed the inquiry for putting away information or records of the
project.

Hardware Requirement

1. Android Phone or Tablet


➢ 1.2 Quad core Processor or higher.
➢ 1 GB RAM

Software Requirement:

1. Laptop or PC
➢ Windows 7 or higher.
➢ SQL Server 2008
➢ Java
➢ Android Studio
2. Android Phone or Tablet

➢ Android v5.0 or Higher

62
4.2 Overview of Technologies Used
4.2.1 Introduction to Android

Android Studio is the specialist Coordinates Improvement Environment (IDE) for


Android application advancement, in light of IntelliJ Thought. On beat of IntelliJ's solid code
administrator and creator disobedient, Android Studio offers much more highlights that
overhaul your proficiency whereas building Android applications, for example:

• An adaptable Grade-based form framework

• A quick and component rich emulator

• A brought together climate where you can create for all Android gadgets

• Moment Run to push changes to your running application without building another
APK

• Code layouts and GitHub mix to assist you with building normal application
elements and import test code

• Broad testing apparatuses and systems

• Build up apparatuses to get execution, ease of use, adaptation similarity, and


different issues

• C++ and NDK support

• Implicit help for Google Cloud Platform, making it simple to coordinate

Google Cloud Messaging and App Engine.

63
4.2.2 Project Structure

Each task in Android Studio contains at least one module with source code documents
and asset records. Sorts of modules include:

• Android app modules

• Library modules

• Google App Engine modules

By default, Android Studio shows your task documents in the Android project view, as
displayed Image. This view is coordinated by modules to give speedy admittance to
your undertaking's key source documents.

64
All the form records are apparent at the high level under Gridley Scripts and each
application module contains the accompanying organizers:

• Shows: Contains the AndroidManifest.xml record.

• Java: Contains the Java source code records, including JUnit test code.

•res: Contains all non-code assets, for example, XML designs, UI strings, and bitmap
pictures.

The Android project structure on disk contrasts with this straightened representation.
To see the real file structure of the Venture, select Extend from the Venture dropdown (in
figure 1, it's appearing as Android). You can to customize the see of the extend records to
center on particular viewpoints of your app improvement. For case, selecting the Issues see
of your Venture shows joins to the source records containing any recognized coding and
sentence structure blunders, such as a lost XML component closing tag in a layout file.

4.2.3 The User Interface


1. The toolbar allows you to do a wide scope of activities, including running your application
and sending off Android apparatuses.

2. The route bar assists you with exploring your venture and opens records for altering.
Furthermore, it gives a smaller perspective on the design apparent in the Project window.

3. The manager window is the place where you make and alter code. Contingent upon the
present document type, the editorial manager can change. For instance, while reviewing a
formatted document, the proofreader shows the Layout Editor.

4. The instrument window bar goes around beyond the IDE window and contains the buttons
that permit you to grow or implode individual device windows.

5. The device windows give you admittance to explicit errands like undertaking the board,
search, and form control, and that's only the tip of the iceberg. You can extend them and
breakdown them down.

65
6. The status bar shows the situation with your venture and the IDE itself, and any
admonitions or messages.

Figure 25: Main_Activity.java

You'll be able to organize the most window to grant yourself more screen space by
covering up or moving toolbars and apparatus windows. You'll moreover utilize console
accessible routes to get to most IDE features. For example, you can look over your source
code, databases, and activities, components of the user interface, and so on by double-
pressing the Move key or clicking the amplifying glass within the upper right-hand corner
of the Android Studio window. This will be exceptionally valuable if, for illustration, you're
attempting to find a specific IDE activity and have overlooked how to trigger it.

4.2.4 Tool Windows

Rather than using pre-set points of view, Android Studio takes after your setting and
naturally brings up significant instrument windows as you work. By default, the foremost

66
commonly utilized instrument windows are stuck to the apparatus window bar at the edges
of the application window.

• To grow or implode an instrument window, click the apparatus' name in the device
window bar. You can likewise drag, pin, unfasten, join, and separate apparatus
windows.
• To get back to the present default device window format, click Window > Restore
Default Layout or alter your default design by clicking Window > Store Current
Layout as Default.
• To show or conceal the whole device window bar, click the window symbol in the
base left-hand corner of the Android Studio window.
• To find a particular device window, drift over the window symbol and select the
apparatus window from the menu.

4.2.4 Navigation

Here are a few hints to assist you with moving around Android Studio.

• Switch between you’re as of late gotten to records utilizing the Recent Files activity.
Press Control+E (Command+E on a Mac) to raise the Recent Files activity. Of
course, the last gotten to record is chosen. You can likewise get to any instrument
window through the left segment in this activity.
• View the design of the present document utilizing the File Structure-activity. Raise
the File Structure-activity by squeezing Control+F12 (Command+F12 on a Mac).
Utilizing this activity, you can rapidly explore to any piece of your present record.
• Look for and explore to a particular class in your venture utilizing the Navigate to
Class activity. Raise the activity by squeezing Control+N (Command+O on a Mac).
Explore to Class upholds complex articulations, including camel bumps, ways, line
explore to, center name coordinating, and so forth. Assuming you call it two times in
succession, it shows you the consequences of the undertaking classes.
• Explore to a document or envelope utilizing the Navigate to file activity. Raise the
Navigate to file activity by squeezing Control+Shift+N (Command+Shift+O on a

67
Mac). To look for organizers instead of records, add a/toward the finish of your
demeanor.
• Explore to a technique or field by name utilizing the Navigate to Symbol activity.
Raise the Navigate to Symbol activity by squeezing Control+Shift+Alt+N
(Command+Shift+Alt+O on a Mac).
• Observe every one of the bits of code referring to the class, technique, field,
boundary, or explanation at the present cursor position by squeezing Alt+F7

Griddle Build System

• Android Studio involves Griddle as the groundwork of the form framework, with
more Android-explicit capacities gave by the Android module to Griddle. This form
framework runs as an incorporated device from the Android Studio menu and freely
from the order line. You can utilize the elements of the form framework to do the
accompanying:
• Alter, design, and broaden the form cycle.
• Make various APKs for your application with various elements utilizing similar
ventures and modules.
• Reuse code and assets across source sets.

By utilizing the adaptability of Griddle, you can accomplish all of this without
adjusting your application's center source records. Android Studio assembles records are
named construct. Gridley. They are plain text records that utilize Groovy punctuation to
design the form with components given by the Android module to Gridley. Each venture has
one high-level form record for the whole task and separate module-level form documents for
every module. Android Studio consequently produces the essential form records when you
import a current task.

4.2.5 Multiple APK Support

Various APK support permits you to make different APKs in light of screen thickness or ABI
proficiently. For instance, you can make separate APKs of an application for the hdpi and mdpi
screen densities while as yet thinking of them as a solitary variation and permitting them to share test
APK, java, dx, and ProGuard settings.

68
Troubleshoot and Profile Tools

Android Studio helps you in troubleshooting and working on the exhibition of your code, including
inline investigating and execution examination apparatuses. Inline troubleshooting

Use inline troubleshooting to upgrade your code walk-throughs in the debugger view with an inline
check of references, articulations, and variable qualities. Inline investigate data incorporates:

• Inline variable values

• Referring objects that reference a selected object

• Method return values

• Lambda and operator expressions

Tooltip values

Figure 26: Performance monitors

Android Studio gives performance monitors to more effectively track your app's memory
and CPU utilization, discover deal located objects, find memory spills, optimize graphics
performance, and dissect arranged demands. Along with your app running on a gadget or
emulator, open the Android Screen apparatus window, and after that, tap the Screens tab.

69
Allocation tracker
Android Studio permits you to track memory assignment because it screens memory
utilize. Following memory allotment will empower you to observe where objects are
distributed when performing particular activities. Knowing these allotments lets, you
optimize your app’s execution and memory utilize by altering the strategy calls related to
those activities.

4.2.6 Code inspections

At whatever point you compile your program, Android Studio naturally runs arranged
Buildup and other IDE assessments to assist you in rapidly recognizing and redressing issues
with the basic quality of your code. The Build-up instrument checks your Android venture
source records for potential bugs and optimization enhancements for rightness, security,
execution, ease of use, availability, and internationalization.

Figure 27: Inspection Result Page

4.2.7 Feasibility Report

A possibility ponder may be a high-level capsule version of the whole handle planning
to reply a few questions: What is the issue? Is there any attainable arrangement to the given
circumstance? Is the issue indeed worth understanding? An achievability ponder is
conducted once the issue is clearly caught on. A possibility consider is vital to decide that

70
the proposed framework is Attainable by considering the specialized, Operational, and
financial variables. The administration will have a clear-cut see of the proposed framework
by having a natty gritty possibility study. The taking after feasibilities is considered for the
venture to guarantee that the venture is variable and does not have any major hindrances. A
possibility think about includes the taking after things:

➢ Technical Feasibility
➢ Economic Feasibility
➢ Operational Feasibility
In this stage, we ponder the possibility of all proposed frameworks, and choose the
finest attainable arrangement for the issue. The achievability is examined based on three
fundamental variables as takes after.
Technical Feasibility
In this step, we confirm whether the proposed frameworks are in fact attainable or not.
i.e., all the innovations required to create the framework are accessible promptly or not.
Technical Possibility decides whether the organization has the innovation and aptitudes
essential to carry out the extended and how this ought to be gotten. The framework can be
doable since of the taking after grounds:

• All essential innovation exists to foster the framework.


• This framework is excessively adaptable and it very well may be extended
further.
• This framework can give assurances of precision, convenience, unwavering
quality, and information security.
• This framework can give moment reactions to requests.

Our undertaking is actually achievable in light of the fact that all the innovation required for
our venture is promptly accessible.

Working System: Windows 7(For PC) and Android v5.0 or on the other hand Higher (For
Android Devices)

Dialects:

JAVA

71
Data set System: MS-SQL Server 2008

Documentation Tool:

MS - Word 2013

Economic Feasibility
In this progression, I confirm which proposition is more efficient. I think about the
monetary advantages of the new framework with the venture. The new framework is
monetarily attainable when there are more economic benefits than the speculations and uses.
Economic Feasibility decides if the task objective can be inside as far as possible allotted to
it or not. It should determine if it is beneficial to handle the whole venture or whether the
advantages got from the new framework are not worth the expenses. Economic benefits
should be equivalent to or surpass the costs. In this issue, we ought to consider:

• The cost to conduct a complete system investigation.


• The cost of h/w and s/w for the application class is considered.
• The development tools.
• The cost of maintenance etc...

Our project is economically feasible because the cost of development is very minimal
compared to the application's financial benefits.

Operational Feasibility
In this progression, we confirm different functional variables of the proposed
frameworks like labor, time and so on; whichever arrangement utilizes less applicable assets
is the best functionally plausible arrangement. The agreement ought to likewise be
functionally conceivable to carry out. Functional Feasibility decides whether the proposed
framework fulfilled client targets and could be fitted into the ongoing framework activity.

• The clients acknowledge the strategies for handling and showing since they
can meet all client necessities.
• The clients have been associated with the preparation and advancement of the
framework.
• The proposed framework won't bring on any issue for any reason.

72
Our task is functionally doable because the time prerequisites and faculty necessities
are fulfilled. We are a group of four individuals, and we dealt with this venture for three
working months.

4.3. Testing
As the project is on a bit expansive scale, I continuously require testing to create it
fruitful. In case each component works appropriately and gives the wanted yield for all kinds
of inputs, at that point, extension is said to be effective. So, the conclusion is to make the
venture effective, it must be tested. The testing done here was Framework Testing checking
whether the client prerequisites were fulfilled. The code for the modern framework has been
composed utilizing JAVA as the coding dialect and Android Studio as the interface for front-
end planning as the interface for front-end designing. The new framework has been tried
well with the assistance of the clients, and all the applications have been confirmed from
each nook and corner of the user. Although a few applications were wrong, these
applications have been adjusted sometime recently, being actualized. The stream of the
shapes is exceptionally much in understanding with the genuine stream of data.

4.3.1 Levels of Testing

In arrange to reveal the errors and display completely different stages, we have the
concept of levels of testing. The fundamental levels of testing are:

Client Needs Acceptance Testing

Requirements System Testing

Design Integration Testing

73
Code Unit Testing

A progression of Testing has finished the proposed framework before the framework
is prepared for the client acknowledgment testing. The means engaged with Testing are:

• Unit Testing

Unit testing centers confirmation endeavors around the littlest unit of the product plan,
the module. This is otherwise called "Module Testing." The modules are tried independently,
and this Testing is done during the programming stage. In this Testing, every module is
viewed as working sufficiently concerning the module's typical result.

4.3.2 Coordination Testing

Information can be earned across a point of interaction; one module can have
unfavorable endeavors on another. Reconciliation testing is deliberately trying to develop
the program structure while simultaneously leading tests to uncover blunders related to the
point of interaction. The goal is to take unit tried modules and assemble a program structure.
Every one of the modules is joined and tried overall. Here the remedy is troublesome because
the confinement of cause is convolute by the massive cost of the whole program. In this
manner, in the mix testing stop, every one of the mistakes revealed is remedied for the text
testing steps.

Framework testing
Framework testing is the phase of execution that is pointed toward guaranteeing that
the framework works precisely and effectively for live activity starts. Testing is imperative
to the outcome of the framework. Framework testing makes a legitimate presumption that if
every one of the pieces of the framework is correct, the objective will be effectively
accomplished.

Approval Testing
At the finish of coordination testing, programming is collected as a bundle,
communication blunders have been revealed and revised, the last series of programming
tests start, and the approval test starts. Approval tests can be characterized in numerous ways.
However, the straightforward definition is that approval succeeds when the product works

74
in a way that the client can sensibly expect. After the approval test has been directed, one of
two potential circumstances exists.

One is the capacity or execution attributes affirm to details and are acknowledged, and the
other is a deviation from determination revealed, and an inadequacy list is made. The
proposed framework viable has been tried by utilizing approval testing and is viewed as
working agreeably.

Yield Testing
After performing approval testing, the following stage yields trying the proposed
framework since no framework could be valuable if it doesn't create the expected result in
the predetermined configuration. Getting some information about the organization they
expected tests the results produced by the framework viable. Here the resulting design is
considered in two ways, one is on the screen, and the other is the printed design. The resulting
design on the screen is viewed as right as the arrangement was planned in the framework
planned stage as indicated by the client's needs.

For the printed copy, the result comes as the predefined necessities by the clients.
Consequently, yield testing results in no rectifications in the framework.

Client Acceptance Testing


Client acknowledgment of a framework is the vital component of the outcome of any
framework. The framework under review is tried for client acknowledgment by continually
staying in contact with the imminent framework clients at the hour of creating and making
changes any place required.

Test Cases
User Login/Registration: To start with login, users must enroll by filling up essential
registration points of interest. There are different areas on enrollment page, and each field
needs to fill by the client, and the client cannot utilize characters within the login id field.
Admin Login: - Admin login id and watchword is kept obligatory areas, and in case the
admin id or secret word doesn't coordinate at that point, it'll appear as a mistake message.

75
Validation Criteria
1. In each structure, no field which isn't invalid capable ought to be left clear.
2. All numeric fields ought to be checked for non-numeric qualities. Also, text
fields like names shouldn't contain any numeric characters.
3. All essential keys should be naturally created to keep the client from entering
any current key.
4. Utilize mistakes for each Save, Edit, erase, and other significant activities.
5. When the client Tabs out or Enter from a message box, the information ought to
be approved, and on the off chance that it is invalid, the center ought to again be
shipped off the message box with a legitimate message.

Advantages of Project
• Parent might follow youngster utilizing their different android application
accommodated the parent.

• Parent could follow the area and get all the call logs, messages and contact list from
the youngster's cell phone.

• Parent can find and recover subtleties anyplace and whenever.

• Application naturally works area demands without client association because kids do
not have information to refresh their area on the map. The framework requires area and
communication administrations. The third benefit is that it very well may be utilized inside
where GPS satellites network isn't accessible. Around then, it can use a network that
accommodates area administrations.

• Network offer support utilizes cell ID, for example, IMEI number for the area
following. In conclusion, every one of the controls is on the parent side, and the kid side has
less control access.

Limitations
• Consider any framework that generally enjoys benefits and drawbacks too. The
application has specific restrictions that can be survived. The application doesn't function
admirably when there is no organization free. The application bombs the particular area.

76
However, the application stores the last place, which can be put away at the information base
server. Whenever versatility is turned off, we think about this as one of the disadvantages of
the framework.

• Requires dynamic web association.

• Youngsters need to log in once into the application.

• Framework will give incorrect outcomes if the information is not entered accurately.

Features
1) Load Balancing:

Since the framework will be accessible, just the administrator signs in how much
burden on the server will be restricted to the time frame of administrator access.

2) Easy Accessibility:

Records can be effectively gotten to and stored and other data separately.

3) User Friendly:

The Website will give an exceptionally easy to understand approach for all clients.

4) Efficient and solid:

Keeping up with the generally gotten and data set on the server which will be available
concurring the client necessity with practically no upkeep cost will be exceptionally
proficient when contrasted with putting away all the client information on the accounting
sheet or in actually in the record books.

5) Easy support:

Android Parent-Child Control is a plan as simple way. So support is additionally


simple.

77
CHAPTER 5
Conclusion
In conclusion, the project was designed for children to monitor and control online side
effects. This project was given depth information about the child tracking system with the
help of four components such as GPS, telephony services, adult content blocked
automatically by Ad-Blocker, and cast screen control option the application is built-in.
Finally, this application has room for enhancement. Crisis cautions such elements can be
added to the upgrade of the framework. The proposed framework will be worked on in later
work. This is my project of System Design about the “Android based children safety and
control” application based on Java. I think this system gave a lot of satisfaction to all of us.
However, every undertaking is never supposed to be exceptional in this advancement field.
Considerably more remarkable improvement might be conceivable in this application. We
advanced countless things and acquired a ton of information about the improvement field.
We hope this will prove fruitful for us.

78
References

1. Hamid, T (2013) “Online Harassment and Digital Stalking” International Journal of


ComputerApplications.[Online].Available:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.402.8620&rep=rep1&type =pdf
[accessed 8 October 2017].

2. Hoofnagle, C. J., King, J., Li, S., & Turow, J. (2010). “How Different are Young Adults
from Older Adults When it Comes to Information Privacy Attitudes and Policies” Rochester,
NY: Social Science Research Network.[Online].Available:
http://papers.ssrn.com/abstract=1589864 [accessed 18 May 2018].

There are no sources in the current document.

3. Lundgren, M. (2014). “IS risk practices from a CST perspective: a literature review”.
Master thesis. Luleå University of Technology.

4. Philips G (2016) ‘7 Ways Your Children Might Bypass Parental Control Software’. MUO.
[Online]. Available: https://www.makeuseof.com/tag/7-ways-children-mightbypass-
parental-control-software/ [accessed 8 May

5. Seale, C., Silverman, D. (1997). “Ensuring rigour in qualitative research”. European


Journal of Public Health, no 7: 379-384.

6. Sliverman, D. (2000). Analyzing talk and text. In Handbook of qualitative research.


Editors Denzin, N.K. and Lincoln, Y.S., 2nd edition, Sage Publications, California, USA.
pp. 821- 834..

79
7. U.S. Dept of Justice (2010) “The national strategy for child exploitation prevention and
interdiction” U.S. Department of Justice [Online]. Available:
https://www.justice.gov/psc/docs/natstrategyreport.pdf [accessed 8 October 2017]

8. Willard, N. E. (2007). Cyber-safe kids, cyber-savvy teens: Helping young people

9. Learn to use the Internet safely and responsibly. John Wiley & Sons.

10. Jevremovic, A., Veinovic, M., Cabarkapa, M., Krstic, M., Chorbev, I., Dimitrovski, I.,
& Stojmenovic, M. (2021). Keeping Children Safe Online with Limited Resources:
Analyzing what is seen and heard. IEEE Access, 9, 132723-132732.

11. CyberSafeIreland (2017) “CyberSafeIreland Annual Report”, CyberSafeIreland,


[Online].Available:http://cybersafeireland.org/wpcontent/uploads/2017/09/CyberSafeIrelan
d-Annual-Report-2017.pdf [accessed 6 January 2017].

12. Fergus, S. (2018). Internet Safety for Children: Stranger danger, misbehavior and
problems when online.

13. Seale, C., Silverman, D. (1997). “Ensuring rigour in qualitative research”. European
Journal of Public Health, no 7: 379-384.

https://melsatar.blog/2012/03/15/software-development-life-cycle-models-and-
methodologies/#:~:text=Waterfall%20Model,-Description

14. Wittes, B. Poplin, C. Jurecic, Q. and Spera, C. (2016) “Sextortion: Cybersecurity,


teenagers, and remote sexual assault”. Center for technology Innovation at Brookings.
[Online].Available:https://www.brookings.edu/wpcontent/uploads/2016/05/sextortion1-
1.pdf [accessed 8 October 2017].

80
Appendix
Appendix A: Interview Guide

Table, Sample’s demographics

NO’s Question characteristics Sample distribution

1 Did you talk to your child about online safety Gender Female= 24
and have you discussed it in the last year?
Male =15

Age 25-29
No

Highest Tertiary
Qualification

2 What do the children do when they are Gender Female= 10


online?
Male =7

Age 25 – 29
Basically they watch YouTube and play
online platform games
Highest Secondary level
Qualification

3 How do you monitor the child’s Internet Gender Female= 21


activity
Male =11

81
Age 25-29

Very rarely do we check children's phones


Highest
directly when they are not near the phone.
Qualification
Tertiary

4 Does the child have access to a smartphone? Gender Female= 31

Male =15

Age 25-29
Yes
Highest Tertiary
Qualification

Exploratory questions and discussion

Note: These questions that require some thinking from the participant. These questions are
based on the answers already given and allow for further exploration and discussion on
topics including

NO’s Question characteristics Sample distribution

1 Is it possible the child is hacking the Gender Female= 24


smartphone?
Male =15

Age 25-29
No

Highest Tertiary
Qualification

82
2 Gender Female= 10

If the child is using a smartphone to access Male =7


the Internet is it secure and discuss?
Age 15 – 19
Obviously Not

Highest Secondary level


Qualification

3 What parenting do the adult carry out with Gender Female= 21


the child in relation to the Internet and the
Male =11
child using it?
Age 25-29

They just see the privacy of their kids


Highest
Qualification
Tertiary

4 What does the adult believe are the potential Gender Female= 31
problems children may encounter?
Male =15

Age 25-29
Yes of course
Highest Tertiary
Qualification

Appendix B: Questionnaire

NO’s Question Yes/No characteristics Sample distribution

83
1 Is your child less than 13 Gender Female= 24
years?
Male =15

No Age 25-29

Highest Tertiary
Qualification

2 Gender Female= 10

Previous to this survey did Male =7


you talk to your child about
No Age 15 – 19
online safety and have you
discussed it in the last year?

Highest Secondary level


Qualification

3 Would you be confident Gender Female= 21


adding parental controls on
Male =11
Internet devices in your
home? Age 25-29
Yes
Highest
Qualification
Tertiary

4 Are you aware of apps Gender Female= 31


specifically for children such
Male =15
as YouTube Kids?
Yes Age 25-29

84
Highest Tertiary
Qualification

BIOGRAPHY

Name –Surname: KAFI MD ISRAFIL MOMIN

85
Date of Birth: October-25, 1997

Home Town: Shibpurhat, Puthia, Rajshahi, Bangladesh.

Current Address: United Arab Emirates, Sharjah

E-mail Address: Kafirx143@gmail.com

Education Background

2022 B.Sc. in Computer science and technology Engineering,


Yunnan Technology And Business University, Kunming,
Yunnan, China.

2015 Higher secondary school certificate,

Biraldaha College, Rajshahi.

2013 Secondary school certificate

.Shibpurhat High School, Puthia, Rajshahi

Work Experiences

2021 Web developer At Smart Vision Sign L.L.C

86

You might also like